Is Technology Undermining Democracy?

Is technology undermining democracy? Do we ever really know how we arrive at our political views?

The pixelated vision of the near future offered in Jamie Bartlett’s new book would suggest that, as we continue to submerge into evermore complex and determinate technological systems, knowing the answer to such questions will become even more difficult.

As well as our concepts and theories, our democratic structures were, Bartlett points out, just not built for the types of technological shifts we are experiencing. Algorithms, cryptocurrency, data targeting, techno monopolies and the like, have changed the game. The result, he argues here, is that technology has now come to undermine a number of the ‘fundamental components of a functioning political system’. The tension between technology and democracy is reaching a new boiling point.

Where his previous book Radicals was about the extremes of politics, and how they sometimes worked their way into mainstream thought, this book by-passes the margins and deals directly with the center field. Following the recent debates around the use of social media data, it’s hard to imagine a timelier book. It zips along, covering the six pillars of democracy, as it is described, and imagining the tensions arising in each. Following a conclusion, the epilogue of the book moves from diagnosis to prescription, offering some potential ways of addressing the problems democracy faces.

The magnitude and severity of the challenges outlined in the earlier chapters mean that the solutions have quite a hill to climb.

The potential solutions are welcome and act as an antidote to the rising fear that the chapters provoke, yet despite their intended hopefulness they seem to underline the magnitude of the problems themselves. The suggestion around policing the algorithms seems to understate the problem and the suggestions around the taxation of robots seems unenforable. There remain though a number of ideas that seem to cut through; the ‘Universal Training Income’ is innovative, the focus on capital seems viable, and the more human and individual actions suggested are where the book offers its richest guide to the future.

In all of this Bartlett’s central concern is with growing inequality. By the end, you can see exactly why he is worried. The growing elite of techno capitalists are gaining unforeseen powers to determine online encounters and more. As Bartlett argues, when we consider these growing tech monopolies we should worry about the assumptions, ideas and futures upon which their victories are based. The destruction of jobs and of alternatives social structures leaves a field in which, as Bartlett notes, the few will achieve whatever they want and everyone else will be left to flounder. This power is couched in a more progressive type of rhetoric.

As Bartlett adds, ‘the worse these companies behave and the richer they become, the more they spend on looking cool and talking about fairness and community’.

This is why Bartlett turns to the classic concepts of hegemony and the panopticon in his book — they capture the advancing dominance of certain ideologies and the self-regulating surveillance that work in tandem in these power dynamics. Gramsci and Foucault don’t fully rear their heads, but there is enough to give some sense of the features that cut-across these platforms. Alongside this, the rise of what he calls ‘re-tribalistion’, where we are drawn towards those like us in online spaces, means that collective resistance to this power becomes difficult — we are too dispersed and distanced across these distributed networks.

Arriving at this volume, we could wonder what is really left to be said about technology and democracy.

The combination of the changing ways in which technology is being used to intervene in democracy, which has found a new purpose with the increases in data, and the way that Bartlett is able to navigate through some wide ranging terrain, mean that this book still brings a freshness of perspective.

Mixing together broader and sometimes familiar shifts in technologies with interviews and behind-the-curtain observations — made from visits to data campaign teams, silicon valley locations, venture capitalists and even Cambridge Analytica — the book offers plenty of moments of intrigue and insight.

The way Bartlett weaves blockchain into the discussion of political disruption, for example, is typical of the type of unusual perspective that the book brings.

From these provocations it becomes clear that there is still much more to be said about these long evolving relations. There is also a pressing need to reflect on the possible solutions.

The People Vs Tech by Jamie Bartlett (Ebury Press, Penguin ISBN: 978-1785039065)

David Beer is Reader in Sociology at the University of York

You Might Also Read:

The Cambridge Analytica Row Shows Politics Are Moving In A Disturbing Direction:

 

« Senior IT Execs Admit Cyber Threats Are Out Of Control
GDPR: It’s A Marathon, Not A Sprint »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

National Cyber League (NCL)

National Cyber League (NCL)

The NCL provides a virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills.

Trinexia

Trinexia

Trinexia (formerly Credence Security) is a specialty Value-added Distributor of Cyber Security, Digital Forensics, Security Awareness, Data Security & Governance solutions.

Viscount Systems

Viscount Systems

Viscount Systems is a global security software solutions company that is changing the way access control is deployed and managed in the enterprise.

SenseOn

SenseOn

SenseOn’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

Identifi Global Recruitment

Identifi Global Recruitment

Identifi Global is one of the UK's leading Cyber Security & IT Recruitment specialists.

DDOS-Guard

DDOS-Guard

DDoS-GUARD is one of the leading service providers on the global DDoS protection and content delivery markets.

White Cloud Security

White Cloud Security

White Cloud is a cloud-based Application Trust-Listing security service that prevents unauthorized programs from running on your computers.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

CodeLock

CodeLock

Codelock is a patent-pending solution that continuously provides software security at the code level, while providing advanced management insights with performance metrics and data analytics.

Oasis Technology

Oasis Technology

Oasis Technology are experts in cyber security. In addition to pioneering the game-changing TITAN anti-hacking device, we provide extensive cyber security consulting services.

Metmox

Metmox

Metmox mission is to be trusted advisor and partner to protect our customer’s evolving Cloud, Network, Application, IT infrastructure and cybersecurity needs.

Rhodian Group

Rhodian Group

Rhodian Group (formerly Adar) specialize in providing Technology, Cybersecurity, and Compliance services to the insurance industry.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.

SafeAeon

SafeAeon

SafeAeon is a leading Cybersecurity-as-a-Service provider, offering 24x7 premium Managed Security Services with AI-powered and Human-driven 24x7 SOC.